Show HN: TheProtector – Linux Bash script for the paranoid admin on a budget
Hacker News (score: 55)Description
I spent the past year building this in my spare time because I got tired of enterprise security tools that cost $50K/year and don't understand Linux.
TheProtector is a comprehensive security monitoring tool that actually runs on the systems we use (Linux) instead of being a Windows-first afterthought. Built it entirely on a $500 laptop because I believe good security shouldn't require unlimited budgets.
Features: - Real-time process, network, and file monitoring - YARA malware detection with custom rules - eBPF kernel monitoring (when available) - Behavioral baseline establishment and anomaly detection - Active threat response (blocks IPs, kills processes, quarantines files) - Anti-evasion detection for rootkits and advanced threats - Honeypots for attack detection - Web dashboard for monitoring - Single bash script, no complex installation
The tagline is "not perfect but better than most" because I'm tired of security vendors claiming their tools are flawless. This actually works, costs $0, and you can read every line of code.
I know bash isn't the sexy choice for security tools, but it runs everywhere, has zero dependencies, and most Linux admins can read/modify it. Sometimes boring technology that works is better than fancy technology that doesn't.
It's designed for the intersection of "paranoid about security" and "don't have enterprise budgets" - which describes most of us actually running Linux systems.
GitHub: https://github.com/IHATEGIVINGAUSERNAME/theProtector
Been running it on my own systems for months. Catches the stuff that matters and doesn't flood you with false positives. If you hate expensive security theater as much as I do, might be worth a look.
Open to feedback, especially from folks who know more about this stuff than I do.
Thanks, IHATEGIVINGAUSERNAME (yes, I really do hate giving usernames)
More from Hacker
Open sourcing Dicer: Databricks's auto-sharder
Open sourcing Dicer: Databricks's auto-sharder
Show HN: Encore – Type-safe back end framework that generates infra from code
Show HN: Encore – Type-safe back end framework that generates infra from code
Show HN: Tamagotchi P1 for FPGAs
Show HN: Tamagotchi P1 for FPGAs After being thrust headfirst into FPGA development thanks to the Analogue Pocket, my first from scratch creation was a gate level implementation of the original Tamagotchi toy.<p>The core, running on both the Analogue Pocket and MiSTer platforms, lets users re-experience the very first Tamagotchi from 1996 with accurate emulation, but modern features. The core has savestates (which is much harder to do in hardware vs software emulation), high turbo speeds (1,800x was the max clock speed I've reached so far), and more.<p>Learning more about hardware and FPGAs is something I've wanted to do for many years, and I highly recommend it for any programmer-brained person. It's a very slightly different way of thinking that has vast consequences on how you look at simple problems.
Show HN: Katakate – Dozens of VMs per node for safe code exec
Show HN: Katakate – Dozens of VMs per node for safe code exec I've built this to make it easy to host your own infra for lightweight VMs at large scale.<p>Intended for exec of AI-generated code, for CICD runners, or for off-chain AI DApps. Mainly to avoid Docker-in-Docker dangers and mess.<p>Super easy to use with CLI / Python SDK, friendly to AI engs who usually don't like to mess with VM orchestration and networking too much.<p>Defense-in-depth philosophy.<p>Would love to get feedback (and contributors: clear & exciting roadmap!), thx
No other tools from this source yet.